Home / malwarePDF  

Worm:Win32/Nuqel.TA


First posted on 27 March 2015.
Source: Microsoft

Aliases :

There are no other names known for Worm:Win32/Nuqel.TA.

Explanation :

Threat behavior

Installation
This threat can create files on your PC, including:

  • %SystemRoot%\system3_.exe
  • \system3_.exe


It modifies the registry so that it runs each time you start your PC. For example:

  • In subkey: HKCU\software\microsoft\windows\currentversion\run
    Sets value: "Yahoo Messengger"
    With data: "\system3_.exe"
  • In subkey: HKLM\software\microsoft\windows nt\currentversion\winlogon
    Sets value: "Shell"
    With data: "explorer.exe system3_.exe"


It creates a schedule to automatically run files on your PC. This can include:

  • \system3_.exe


Payload
Changes web browser settings


It can change your Internet Explorer start page by modifying the following registry entry:

In subkey: HKCU\software\microsoft\internet explorer\main
Sets value: "Start Page"
With data: "http://www.mydreamworld.50webs.com"



Connects to a remote host

We have seen this threat connect to a remote host, including:
  • h1.ripway.com using port 80
Malware can connect to a remote host to do any of the following:
  • Check for an Internet connection
  • Download and run files (including updates or other malware)
  • Report a new infection to its author
  • Receive configuration or other data
  • Receive instructions from a malicious hacker
  • Search for your PC location
  • Upload information taken from your PC
  • Validate a digital certificate


This malware description was published using automated analysis of file SHA1 117a7125204c3e6aac562c76fd05d6e45dcc9c49.

Symptoms

The following can indicate that you have this threat on your PC:

  • You see a file similar to:
    • %SystemRoot%\system3_.exe
    • \system3_.exe
  • You see registry modifications such as:
    • In subkey: HKCU\software\microsoft\internet explorer\main
      Sets value: "Start Page"
      With data: "http://www.mydreamworld.50webs.com"

    • In subkey: HKCU\software\microsoft\windows\currentversion\run
      Sets value: "Yahoo Messengger"
      With data: "\system3_.exe"

    • In subkey: HKLM\software\microsoft\windows nt\currentversion\winlogon
      Sets value: "Shell"
      With data: "explorer.exe system3_.exe"

Last update 27 March 2015

 

TOP